SRFuzzer: An Automatic Fuzzing Framework for Physical SOHO Router Devices to Discover Multi-Type Vulnerabilities

被引:28
|
作者
Zhang, Yu [1 ,3 ,4 ,5 ]
Huo, Wei [1 ,3 ,4 ,5 ]
Jian, Kunpeng [1 ,3 ,4 ,5 ]
Shi, Ji [1 ,3 ,4 ,5 ]
Lu, Haoliang [1 ,3 ,4 ,5 ]
Liu, Longquan [1 ,3 ,4 ,5 ]
Wang, Chen [1 ,3 ,4 ,5 ]
Sun, Dandan [1 ,3 ,4 ,5 ]
Zhang, Chao [2 ,6 ]
Liu, Baoxu [1 ,3 ,4 ,5 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Tsinghua Univ, Inst Network Sci & Cyberspace, Beijing 100084, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[4] Chinese Acad Sci, Key Lab Network Assessment Technol, Beijing, Peoples R China
[5] Beijing Key Lab Network Secur & Protect Technol, Beijing, Peoples R China
[6] Beijing Natl Res Ctr Informat Sci & Technol, Beijing, Peoples R China
关键词
Fuzzing; IoT; automatic vulnerability/bug detection; data inconsistency;
D O I
10.1145/3359789.3359826
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SOHO (small office/home office) routers provide services for end devices to connect to the Internet, playing an important role in the cyberspace. Unfortunately, security vulnerabilities pervasively exist in these routers, especially in the web server modules, greatly endangering end users. To discover these vulnerabilities, fuzzing web server modules of SOHO routers is the most popular solution. However, its effectiveness is limited, due to the lack of input specification, lack of routers' internal running states, and lack of testing environment recovery mechanisms. Moreover, fuzzing in general only reports memory corruption vulnerabilities, and fails to discover other vulnerabilities, e.g., web-based vulnerabilities. In this paper, we propose a solution SRFuzzer to address these issues. It is a fully automated fuzzing framework for testing physical SOHO devices. It continuously and effectively generates test cases by leveraging two input semantic models, i.e., KEY-VALUE data model and CONF-READ communication model, and automatically recovers testing environment with power management. It also coordinates diversified mutation rules with multiple monitoring mechanisms to trigger multi-type vulnerabilities. To the best of our knowledge, it is the first whole-process fully automated fuzzing framework for SOHO routers. We ran SRFuzzer on 10 popular routers across five vendors. In total, it discovered 208 unique exceptional behaviors, 97 of which have been confirmed as 0-day vulnerabilities. The experimental results show that SRFuzzer outperforms state-of-the-art solutions in terms of types and number of vulnerabilities found.
引用
收藏
页码:544 / 556
页数:13
相关论文
共 5 条
  • [1] ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities
    Yu Zhang
    Wei Huo
    Kunpeng Jian
    Ji Shi
    Longquan Liu
    Yanyan Zou
    Chao Zhang
    Baoxu Liu
    Cybersecurity, 4
  • [2] ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities
    Zhang, Yu
    Huo, Wei
    Jian, Kunpeng
    Shi, Ji
    Liu, Longquan
    Zou, Yanyan
    Zhang, Chao
    Liu, Baoxu
    CYBERSECURITY, 2021, 4 (01)
  • [3] SHFuzz: Service handler-aware fuzzing for detecting multi-type vulnerabilities in embedded devices
    Li, Xixing
    Zhao, Lei
    Wei, Qiang
    Wu, Zehui
    Shi, Weiming
    Wang, Yunchao
    COMPUTERS & SECURITY, 2024, 138
  • [4] A multi-type artifact framework for cyber-physical, social systems design and development
    Maamar, Zakaria
    Kajan, Ejub
    Al-Khafajiy, Mohammed
    Dohan, Murtada
    Fayoumi, Amjad
    Yahya, Fadwa
    INTERNET OF THINGS, 2023, 22
  • [5] A knowledge reuse framework for automatic construction of multi-type 3D railway scenes
    Zhang, Heng
    Zhu, Jun
    Han, Zujie
    Wang, Changjin
    Quan, Yushan
    Gao, Wenfeng
    Wang, Hua
    Fan, Dengke
    Zhao, Wen
    Huang, Yi
    JOURNAL OF SPATIAL SCIENCE, 2019, 64 (03) : 443 - 468